Skip to main content

Blockchain-Enhanced Federated Learning for Secure Malicious Activity Detection in Cyber-Physical Systems

  • Conference paper
  • First Online:
Recent Trends in Image Processing and Pattern Recognition (RTIP2R 2023)

Abstract

Detecting and securing against malicious activity in cyber-physical systems (CPS) while optimizing resource utilization pose significant challenges. In this paper we propose an innovative approach that combines water wave optimization (WWO) for feature selection, deep recurrent neural networks (RNN) for training, and blockchain-based security to enhance the efficiency and accuracy of malicious activity detection in CPS. The WWO technique is applied to extract the most relevant features from the intricate and high-dimensional CPS data, effectively reducing dimensionality and improving computational efficiency. These selected features are then inputted into a deep RNN model, capable of capturing temporal dependencies and patterns within the data, thus enabling effective identification of malicious activities. To strengthen the security of the CPS system, we integrate blockchain technology as a foundation for secure data storage and management. By leveraging blockchain, we establish a decentralized and tamper-proof ledger that ensures the integrity and transparency of detected activities. The immutability of the blockchain provides robust protection against malicious tampering or unauthorized modifications, enhancing the overall security of the CPS system. We evaluate our proposed system architecture using a real-world CPS dataset, showcasing its superiority in accuracy and efficiency compared to traditional feature selection methods. The WWO-based feature selection significantly reduces the feature space while preserving critical discriminative information necessary for detection. The deep RNN model, trained on the selected features, achieves high accuracy in classifying and identifying malicious activities. Moreover, our approach exhibits robustness and adaptability in the face of evolving attack patterns. By training the deep RNN on a diverse and extensive dataset, the model becomes more resilient to unknown attacks, thereby enhancing CPS security. The integration of water wave optimization for feature selection, deep RNN for training, and blockchain-based security offers a promising avenue for improving malicious activity detection in CPS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References:

  1. Liu, Y., Chen, G.: A comparative study of feature selection techniques for malicious activity detection in cyber-physical systems. IEEE Trans. Industr. Inf. 14(10), 4455–4464 (2018)

    Google Scholar 

  2. Sharma, A., Bali, K.: Malicious activity detection in cyber-physical systems using recurrent neural networks. In: Proceedings of the International Conference on Machine Learning, Big Data, and Business Analytics, pp. 192–204 (2019)

    Google Scholar 

  3. Yan, H., Zhang, J.: Blockchain-enabled security for cyber-physical systems: a review. IEEE Trans. Industr. Inf. 15(1), 503–510 (2019)

    Google Scholar 

  4. Wang, X., Chen, J., Cao, L.: A hybrid feature selection and machine learning framework for malicious activity detection in cyber-physical systems. Futur. Gener. Comput. Syst. 76, 69–79 (2017)

    Google Scholar 

  5. Gai, K., Qian, Y.: Blockchain-based security for cyber-physical systems: a survey. IEEE Trans. Industr. Inf. 16(6), 4441–4451 (2020)

    Google Scholar 

  6. Liu, W., Zhu, X., Cheng, X.: Hybrid feature selection algorithm for malicious activity detection in cyber-physical systems. J. Ambient. Intell. Humaniz. Comput. 9(5), 1763–1774 (2018)

    Google Scholar 

  7. Raza, S., Sher, M., Malik, A.: Secure data sharing framework for cyber-physical systems based on blockchain technology. IEEE Trans. Industr. Inf. 15(6), 3480–3488 (2019)

    Google Scholar 

  8. Bao, W., Xu, J., Cao, J.: A blockchain-based access control system for cyber-physical systems. IEEE Trans. Industr. Inf. 14(11), 4870–4879 (2018)

    Google Scholar 

  9. Almohaimeed, A., Alharbi, A., Alzahrani, A.: A hybrid deep learning model for malicious activity detection in cyber-physical systems. Futur. Gener. Comput. Syst. 112, 238–247 (2020)

    Google Scholar 

  10. Li, X., Huang, X., Wang, X.: Malicious activity detection in cyber-physical systems using machine learning and blockchain technology. In: Proceedings of the International Conference on Machine Learning and Cybernetics, pp. 1087–1092 (2017)

    Google Scholar 

  11. Zhang, Z., Guo, Y., Li, S.: Feature selection and malicious activity detection in cyber-physical systems using genetic algorithm and machine learning. IEEE Access 7, 82468–82478 (2019)

    Google Scholar 

  12. Zhao, Y., Han, Z., Cao, Y.: An intelligent intrusion detection system for cyber-physical systems based on deep learning. IEEE Trans. Industr. Inf. 14(7), 3206–3215 (2018)

    Google Scholar 

  13. Xu, C., Dai, Y.: Blockchain-based auditable access control for cyber-physical Systems. IEEE Trans. Industr. Inf. 15(1), 463–472 (2019)

    Google Scholar 

  14. Karim, A., Abbas, H.: A hybrid model for malicious activity detection in cyber-physical systems using particle swarm optimization and deep learning. Futur. Gener. Comput. Syst. 87, 693–703 (2018)

    Google Scholar 

  15. Li, C., Yang, F., Zhang, W.: Blockchain-based Integrity Verification for Cyber-Physical Systems. IEEE Trans. Industr. Inf. 16(5), 3194–3203 (2020)

    Google Scholar 

  16. Zhao, Y., Han, Z.: Deep learning-based malicious activity detection in industrial cyber-physical systems. IEEE Trans. Industr. Inf. 16(1), 188–198 (2020)

    Google Scholar 

  17. Wang, T., Zhang, J.: A blockchain-enabled trust model for secure data sharing in cyber-physical systems. IEEE Trans. Industr. Inf. 16(3), 1892–1901 (2020)

    Google Scholar 

  18. Zhou, C., Liu, F.: Malicious activity detection in cyber-physical systems using hybrid particle swarm optimization and extreme learning machine. IEEE Access 6, 30886–30894 (2018)

    Google Scholar 

  19. Yang, X., Xu, D., Ren, K.: Blockchain-based data integrity auditing for cyber-physical systems. IEEE Trans. Industr. Inf. 15(10), 5533–5543 (2019)

    Google Scholar 

  20. Li, Y., Jiang, X., Dai, S.: A deep learning approach for intrusion detection using recurrent neural networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 278–285 (2017)

    Google Scholar 

  21. Kim, Y., Park, J., Kim, J., Kim, S.: Long short-term memory recurrent neural network for network traffic classification. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 201–206 (2016)

    Google Scholar 

  22. Abdulhamid, S.M., Atiya, A.F.: Feature selection with a novel improved water wave optimization algorithm. In: 2018 10th International Conference on Machine Learning and Computing (ICMLC), pp. 150–155 (2018)

    Google Scholar 

  23. Buczak, A.L., Guven, E.: A survey of network flow applications. J. Netw. Comput. Appl. 60, 125–144 (2016)

    Google Scholar 

  24. Abdessalem, R.B., Nolle, L.: Detecting malicious activity in IoT networks using machine learning algorithms. In: Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), pp. 55–63 (2016)

    Google Scholar 

  25. Ronao, C.A., Cho, S.B.: Human activity recognition with smartphone sensors using deep learning neural networks. Expert Syst. Appl. 59, 235–244 (2016)

    Article  Google Scholar 

  26. Saxe, J., McCloskey, S., Berger, J.: Deep neural network based intrusion detection in software defined networking. In: 2015 11th International Conference on Network and Service Management (CNSM), pp. 400–405 (2015)

    Google Scholar 

  27. Salehahmadi, Z., Dehghantanha, A., Choo, K.K.R., Conti, M.: Intrusion detection system for the Internet of Things utilizing a deep learning approach. J. Netw. Comput. Appl. 103, 1–10 (2018)

    Google Scholar 

  28. Erkol, B., Yilmaz, Y., Bicakci, K., Anarim, E.: Anomaly detection in IoT networks using deep neural networks. In: Proceedings of the 8th International Conference on Internet of Things, pp. 68–73 (2017)

    Google Scholar 

  29. Liu, Y., Xiang, Y., Fan, Y.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2018)

    Article  Google Scholar 

  30. Tan, S.H., Ristaniemi, T.: Recent advances in feature selection and its applications. Expert Syst. Appl. 42(8), 4378–4409 (2015)

    Google Scholar 

  31. Abdullah, R., Tawalbeh, L., Khreishah, A.: Survey of machine learning algorithms for network anomaly detection. J. Netw. Comput. Appl. 60, 19–31 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arvind Kamble .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kamble, A., Malemath, V.S., Muddapu, S. (2024). Blockchain-Enhanced Federated Learning for Secure Malicious Activity Detection in Cyber-Physical Systems. In: Santosh, K., et al. Recent Trends in Image Processing and Pattern Recognition. RTIP2R 2023. Communications in Computer and Information Science, vol 2027. Springer, Cham. https://doi.org/10.1007/978-3-031-53085-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-53085-2_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-53084-5

  • Online ISBN: 978-3-031-53085-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics